AI and machine learning and their uses in cybersecurity

Artificial intelligence and machine learning trends

Although artificial intelligence and its subfield of machine learning have been applied in cybersecurity for some time, the speed of adoption is now accelerating. As threats evolve and IT environments get more complicated, AI-driven technology shows the potential of addressing new threats and risks that require machine speed rather than human speed.

More vendors are folding machine learning and other AI applications into their solutions — not surprising, considering organizations are increasingly turning to this technology to help stay ahead of threats. Asked by an Oracle survey what the most significant benefit of autonomous technologies was for organizations, “improving security” was one of the top choices by C-suite executives.

In a 2019 survey by Capgemini Research Institute, 69 percent of the surveyed security executives and leaders said they didn’t believe they could respond to cyberattacks without AI. Additionally, nearly two-thirds said they were testing AI use cases and almost half said that FY20 budgets for AI in cybersecurity would increase by nearly a third.

Below are just some of the ways that organizations can use AI and machine learning for cybersecurity.

Identifying anomalies in network traffic or user behavior

Cisco forecasts the global number of internet users to grow from 3.9 billion in 2018 to 5.3 billion by 2023, a 6 percent compound annual growth rate (CAGR). But what’s more mind-boggling is the fact that the number of connections and devices is growing even faster, at 10 percent CAGR. By 2023, the number of devices connected to IP networks will be more than triple the global human population. 

As the traffic grows, detecting anomalous behavior in the network becomes more challenging. AI and machine learning (ML) can identify deviations from normal patterns faster, recognizing behaviors that indicate potential threats. 

(Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Rodika Tollefson. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/780Tp04tAag/